peer reviewedAt CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division property based cube attack method making it possible to launch cube attacks with cubes of dimensions far beyond practical reach. However, assumptions are made to validate their attacks. In this paper, we further formulate the algebraic properties of the superpoly in one framework to facilitate cube attacks in more successful applications: we propose the “flag” technique to enhance the precision of MILP models, which enable us to identify proper non-cube IV assignments; a degree evaluation algorithm is presented to upper bound the degree of the superpoly s.t. the superpoly can be recovered without constructing its whole truth table and o...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division propert...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primit...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
The cube attack is a powerful cryptanalysis technique against symmetric ciphers, especially stream c...
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. c...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Cube attack was proposed by Dinur and Shamir, and it has become an important tool for analyzing stre...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division propert...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primit...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
The cube attack is a powerful cryptanalysis technique against symmetric ciphers, especially stream c...
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. c...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Cube attack was proposed by Dinur and Shamir, and it has become an important tool for analyzing stre...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...